2010 - Milcom 2010 Military Communications Conference 2010
DOI: 10.1109/milcom.2010.5680360
|View full text |Cite
|
Sign up to set email alerts
|

A cloud-oriented cross-domain security architecture

Abstract: The Monterey Security Architecture addresses the need to share high-value data across multiple domains of different classification levels while enforcing information flow policies. The architecture allows users with different security authorizations to securely collaborate and exchange information using commodity computers and familiar commercial client software that generally lack the prerequisite assurance and functional security protections. MYSEA seeks to meet two compelling requirements, often assumed to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(4 citation statements)
references
References 40 publications
(36 reference statements)
0
4
0
Order By: Relevance
“…The IPsec protocol version used here for cloud computing purposes will consist of a type known as MYSEA. In general terms, the MYSEA IPSec protocol for cryptographic encrypted cloud services has the function of promoting scalability, agility, sharing of resources and collaboration on the cloud platform [6]. The cloud platform can in this case come in the form of private ones, hybrid or public ones.…”
Section: Internet Protocol Security (Ipsec)mentioning
confidence: 99%
“…The IPsec protocol version used here for cloud computing purposes will consist of a type known as MYSEA. In general terms, the MYSEA IPSec protocol for cryptographic encrypted cloud services has the function of promoting scalability, agility, sharing of resources and collaboration on the cloud platform [6]. The cloud platform can in this case come in the form of private ones, hybrid or public ones.…”
Section: Internet Protocol Security (Ipsec)mentioning
confidence: 99%
“…In fact, there are many existing studies that have focused on the area of cross-domain security. The study in [19] is based on the basic idea of a cloud service consumption and delivery method, and across-domain, distributed architecture scheme was provided. Enforced traditional mandatory access control also attracted much attention, such as the Bell-LaPadula model, which is used in [20].…”
Section: Related Studiesmentioning
confidence: 99%
“…So, only tried and become successful to hack one of the servers can give the hacker all information about the file, which is not desirable. Some other models and secured architecture are proposed for ensuring security in cloud computing environment [18,19]. Though these model ensures secured communication between users and servers, but these models doesn't encrypt the loaded information.…”
Section: Related Workmentioning
confidence: 99%